Written by John Carnell
Friday, 18 December 2009 08:53
Here is how the DNS Hack works
Hackers know that to gain access to a system they have to go through multiple layers of security designed to keep them out, so the best approach is to try and find a weak link in the chain. External servers that provide a service to Twitter are a good place to start.
In his case the Hackers targeted Twitters DNS record, DNS as I have written about before is how we make web addresses relate to a unique number on the web called the IP address when you type in Twitter.com the DNS servers "Translate" that into a number and locate the correct server for you.
The hackers Hijacked the DNS record and point it to a server they control. Twitters own servers were not directly compromised!
In this instance we were VERY LUCKY the hackers were just making a point, it could of been much worse if they had setup a clone of the Twitter.com homepage and collected login information.
How to guard against this sort of DNS Hijack Attack
The best way to guard against this sort of attack is to make sure your Domain contact details are up to date, that you use a complex password to access your DNS providers control panels and if its a .com .net or .org domain that you keep the DOMAIN LOCK ON.
These are all precautions that can make it more difficult for a hacker to take control of your domain name, sadly though if the hacker manages to comprimise the DNS providers system using other methods there's not much you can do to prevent it.
If it happens to you contact your DNS provider immediately and ask them to revert you back to your last IP address, change all your passwords and place an elevated watch on your account or ask that they contact you first before accepting any changes in future.
The copyrighted work at issue is the text that appears on
http://www.technicavita.org/social-advice/twitter/how-twittercoms-dns-was-hacked.html